Search
Search Results
-
Privileged Access Management (PAM)
Privileged Access Management (PAM) is a subdiscipline within the Identity and Access Management framework. PAM can be implemented and can operate on... -
Reinvent Cloud Software Stacks for Resource Disaggregation
Due to the unprecedented development of low-latency interconnect technology, building large-scale disaggregated architecture is drawing more and more...
-
Power-time resource allocation for downlink SWIPT-assisted cooperative NOMA systems
We study a downlink cooperative non-orthogonal multiple access (NOMA) system in which a base station (BS) serves two paired users on the same...
-
Predictive resource allocation and VNF deployment using ensemble learning
Network function virtualization allows the implementation of network services on readily available commercial off-the-shelf servers. A primary...
-
QoS-Aware Computational Resource Allocation
Recently, the boosting growth of computation-heavy applications raises great challenges for the Fifth Generation (5G) and future wireless networks.... -
Research Data with Open Access in Foreign Information Systems
AbstractThe results are presented of the analysis of 214 foreign current research information systems (–CRISs) as basic resources reflecting the...
-
Virtual Network Function Development for NG-PON Access Network Architecture
Modern networks urge agility, flexibility, and capacity to cope with the growing demand for media content and applications increasingly oriented...
-
Blockchain-based collaborative business process data sharing and access control
To solve the problems of large-scale data storage and reliable access control in blockchain-based collaborative business process executions with...
-
Data Access
In this chapter, you will learn how Spring can simplify your database access tasks (Spring can also simplify your NoSQL and BigData tasks, which is... -
Dynamic task offloading for resource allocation and privacy-preserving framework in Kubeedge-based edge computing using machine learning
KubeEdge is an open-source system extending native containerized application orchestration and device management to hosts at the edge. One of the...
-
Blockchain based authentication and access control protocol for IoT
The integration of various advancements, ongoing management, intellectual capacity, item sensors, and incorporated frameworks have all contributed to...
-
Blockchain-enabled IoT access control model for sharing electronic healthcare data
Deploying the Internet of Things (IoT) in the transfer of enormous medical data often promotes challenges with the security, confidentiality, and...
-
From Vision to Evaluation: A Metrics Framework for the ACCESS Allocations Service
The Allocations Service for the Advanced Cyberinfrastructure Coordination Ecosystem: Services & Support (ACCESS) program is charged with accepting,...
-
A family of truthful mechanisms for resource allocation with multi-attribute demand in mobile edge computing
We address the problem of resource allocation with multi-attribute demand considering heterogeneous servers in mobile edge computing (MEC). A mobile...
-
A knowledge graph empowered online learning framework for access control decision-making
Knowledge graph, as an extension of graph data structure, is being used in a wide range of areas as it can store interrelated data and reveal...
-
Modeling and enforcing access control policies in conversational user interfaces
Conversational user interfaces (CUIs), such as chatbots, are becoming a common component of many software systems. Although they are evolving in many...
-
A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions
Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control....
-
Low-Resource Machine Translation Training Curriculum Fit for Low-Resource Languages
We conduct an empirical study of neural machine translation (NMT) for truly low-resource languages, and present a training curriculum fit for cases... -
Real-Time Challenges and Opportunities for an Effective Resource Management in Multi-cloud Environment
As the usage of multi-cloud setups grows, resource management will become a major concern. Because of the dynamic nature of these environments, as...
-
Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing
With the rapid advancements in technology, cloud computing has emerged as a prominent paradigm for efficient data storage and processing. However,...